A novel method for embedding and extracting secret messages in textual documents based on paragraph resizing

Benjamin Aziz, Aysha Abdulmonem Abdulla Erhama Bukhelli, Rinat Khusainov, Alaa Mohasseb

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The ancient technique of information hiding known as text steganography has enjoyed much research in recent years due to the rising popularity of social media platforms and the abundant availability of online literature and other text as cover media for steganography. Whilst the majority of the research approaches have focused on manipulating or replacing text, in some form or another, to embed secret information, the utilisation of the structure of the document itself for such embedding has rarely been researched. Therefore, we propose in this short paper a new approach for embedding secret messages in textual documents based on the splitting, merging, and resizing of paragraph text. The size comparison between adjacent paragraphs embeds one bit of information. We outline only the basic idea and define the syntax and semantics of the embedding language.
Original languageEnglish
Title of host publicationProceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022)
PublisherSciTePress
Publication statusAccepted for publication - 3 Jun 2022
Event19th International Conference on Security and Cryptography - Lisbon, Portugal
Duration: 11 Jul 202213 Jul 2022
http://secrypt.scitevents.org

Conference

Conference19th International Conference on Security and Cryptography
Abbreviated titleSECRYPT 2022
Country/TerritoryPortugal
CityLisbon
Period11/07/2213/07/22
Internet address

Keywords

  • formal methods
  • linguistic steganography
  • information hiding
  • lexical steganography
  • text steganography

Fingerprint

Dive into the research topics of 'A novel method for embedding and extracting secret messages in textual documents based on paragraph resizing'. Together they form a unique fingerprint.

Cite this